Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
>400 subscribers
>400 subscribers
Share Dialog
Share Dialog
There is a ton of confusion out there about Apple’s refusal to comply with a court order. The most level headed account I have been able to find is by the Register and I highly recommend reading it.
The question I am more interested in is the following: what *should* the security design be for unlocking personal devices such as smartphones, but also say smart cars, fitness trackers, etc.
I would posit that each device should ship with an *individual* key that is created by the manufacturer specifically for the purpose of unlocking the device. The key should then be stored in a way where it can be requested by law enforcement (either by the manufacturer or a third party that specializes in compliance for this). The process for such a request should run via the judiciary and mirror that for a warrant.
This type of unlocking could then be requested in a case like the one at hand. It would also be useful in other cases some of which might not even involve law enforcement. Take an inheritance case, for example, where critical documents exist either device only or are encrypted with keys held on a device. Here the request would come directly from probate court.
I would love to hear from folks who really understand security if such a scheme would work or not (and/or point me to people who have thought about this).
There is a ton of confusion out there about Apple’s refusal to comply with a court order. The most level headed account I have been able to find is by the Register and I highly recommend reading it.
The question I am more interested in is the following: what *should* the security design be for unlocking personal devices such as smartphones, but also say smart cars, fitness trackers, etc.
I would posit that each device should ship with an *individual* key that is created by the manufacturer specifically for the purpose of unlocking the device. The key should then be stored in a way where it can be requested by law enforcement (either by the manufacturer or a third party that specializes in compliance for this). The process for such a request should run via the judiciary and mirror that for a warrant.
This type of unlocking could then be requested in a case like the one at hand. It would also be useful in other cases some of which might not even involve law enforcement. Take an inheritance case, for example, where critical documents exist either device only or are encrypted with keys held on a device. Here the request would come directly from probate court.
I would love to hear from folks who really understand security if such a scheme would work or not (and/or point me to people who have thought about this).
No comments yet